Tcpreplay is a suite of free Open Source utilities for editing and replaying previously captured network traffic. It can replay malicious traffic patterns to Intrusion Detection/Prevention Systems and also replay to web servers. It supports switches, routers, and IP Flow/NetFlow appliances. It provides various tools such as tcpreplay, tcprewrite, tcpreplay-edit, tcpprep, tcpbridge, tcpliveplay, and tcpcapinfo, each with its own specific functionality. Tcpreplay can be used to test network devices, simulate traffic, and analyze network performance.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.
PFQ v6.2 is a functional framework for Linux optimized for efficient packet capture/transmission and in-kernel processing.
A fast and simple recursive content discovery tool